Sciweavers

393 search results - page 69 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
SIGSOFT
2003
ACM
16 years 19 days ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SACMAT
2003
ACM
15 years 5 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 5 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
CCS
2008
ACM
15 years 1 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
MM
1995
ACM
173views Multimedia» more  MM 1995»
15 years 3 months ago
An Application Level Video Gateway
The current model for multicast transmission of video over the Internet assumes that a fixed average bandwidth is uniformly present throughout the network. Consequently, sources ...
Elan Amir, Steven McCanne, Hui Zhang